| dc.contributor.author | Ghosh, Supriyo | |
| dc.contributor.author | Jaillet, Patrick | |
| dc.date.accessioned | 2022-07-13T15:14:43Z | |
| dc.date.available | 2022-07-13T15:14:43Z | |
| dc.date.issued | 2022 | |
| dc.identifier.uri | https://hdl.handle.net/1721.1/143703 | |
| dc.language.iso | en | |
| dc.publisher | Elsevier BV | en_US |
| dc.relation.isversionof | 10.1016/J.COR.2021.105558 | en_US |
| dc.rights | Creative Commons Attribution-NonCommercial-NoDerivs License | en_US |
| dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | en_US |
| dc.source | arXiv | en_US |
| dc.title | An iterative security game for computing robust and adaptive network flows | en_US |
| dc.type | Article | en_US |
| dc.identifier.citation | Ghosh, Supriyo and Jaillet, Patrick. 2022. "An iterative security game for computing robust and adaptive network flows." Computers and Operations Research, 138. | |
| dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | |
| dc.relation.journal | Computers and Operations Research | en_US |
| dc.eprint.version | Original manuscript | en_US |
| dc.type.uri | http://purl.org/eprint/type/JournalArticle | en_US |
| eprint.status | http://purl.org/eprint/status/NonPeerReviewed | en_US |
| dc.date.updated | 2022-07-13T15:09:26Z | |
| dspace.orderedauthors | Ghosh, S; Jaillet, P | en_US |
| dspace.date.submission | 2022-07-13T15:09:27Z | |
| mit.journal.volume | 138 | en_US |
| mit.license | PUBLISHER_CC | |
| mit.metadata.status | Authority Work and Publication Information Needed | en_US |